[Info-vax] VMS Privileges Versus Linux Capabilities
David Froble
davef at tsoft-inc.com
Wed Jun 22 20:11:08 EDT 2016
Paul Sture wrote:
> On 2016-06-22, David Froble <davef at tsoft-inc.com> wrote:
>> mcleanjoh at gmail.com wrote:
>>> On Friday, June 17, 2016 at 10:06:43 AM UTC+10, Stephen Hoffman wrote:
>>>
>>>> UWSS and drivers and execlets and ACPs, and images
>>>> installed with any ALL-class privilege — and other such constructs —
>>>> are already or can become fully privileged, with complete system
>>>> access.
>>> I thought ALL privileges didn't automatically include SECURITY
>>> privilege, or does it in some contexts?
>>>
>
> That does ring a faint bell. What version of VMS?
>
>> Hmmm ....
>>
>> AS800> set proc/priv=all
>> AS800> sho proc/priv
>>
>> 22-JUN-2016 16:37:17.79 User: DFE Process ID: 0000012F
>> Node: AS800 Process name: "DFE"
>>
>> Authorized privileges:
>> NETMBX SETPRV SYSPRV TMPMBX
>>
>> Process privileges:
>> ACNT may suppress accounting messages
>> ALLSPOOL may allocate spooled device
>> ALTPRI may set any priority value
>> AUDIT may direct audit to system security audit log
>> BUGCHK may make bug check log entries
>> BYPASS may bypass all object access controls
>> CMEXEC may change mode to exec
>> CMKRNL may change mode to kernel
>> DIAGNOSE may diagnose devices
>> DOWNGRADE may downgrade object secrecy
>> EXQUOTA may exceed disk quota
>> GROUP may affect other processes in same group
>> GRPNAM may insert in group logical name table
>> GRPPRV may access group objects via system protection
>> IMPERSONATE may impersonate another user
>> IMPORT may set classification for unlabeled object
>> LOG_IO may do logical i/o
>> MOUNT may execute mount acp function
>> NETMBX may create network device
>> OPER may perform operator functions
>> PFNMAP may map to specific physical pages
>> PHY_IO may do physical i/o
>> PRMCEB may create permanent common event clusters
>> PRMGBL may create permanent global sections
>> PRMMBX may create permanent mailbox
>> PSWAPM may change process swap mode
>> READALL may read anything as the owner
>> SECURITY may perform security administration functions
>> SETPRV may set any privilege bit
>> SHARE may assign channels to non-shared devices
>> SHMEM may create/delete objects in shared memory
>> SYSGBL may create system wide global sections
>> SYSLCK may lock system wide resources
>> SYSNAM may insert in system logical name table
>> SYSPRV may access objects via system protection
>> TMPMBX may create temporary mailbox
>> UPGRADE may upgrade object integrity
>> VOLPRO may override volume protection
>> WORLD may affect other processes in the world
>>
>> Process rights:
>> DFE resource
>> INTERACTIVE
>> REMOTE
>>
>> System rights:
>> SYS$NODE_AS800
>>
>> Soft CPU Affinity: off
>>
>> Yep, there it is, right after READALL and before SETPRV ....
>
> Same behaviour for SECURITY on VAX V7.3-1.
>
> SETPRV is a special one though. It doesn't actually go away
> if you disable it. Note for the following user SETPRV is enabled
> in the default privileges, but not in the authorized ones.
>
> UAF> show fred
>
> ...
>
> Authorized Privileges:
> ALTPRI CMKRNL IMPERSONATGRPNAM NETMBX OPER SYSNAM SYSPRV
> TMPMBX VOLPRO WORLD
> Default Privileges:
> ALTPRI CMKRNL IMPERSONATGRPNAM NETMBX OPER SETPRV SYSNAM
> SYSPRV TMPMBX VOLPRO WORLD
>
> And it doesn't show up in the authorized privileges, it is in the current
> ones:
>
> $ sh proc/priv
>
> 22-JUN-2016 22:56:37.47 User: FRED Process ID: 00000215
> Node: SPEEDY Process name: "FRED"
>
> Authorized privileges:
> ALTPRI CMKRNL IMPERSONATGRPNAM NETMBX OPER SYSNAM SYSPRV
> TMPMBX VOLPRO WORLD
>
> Process privileges:
> ALTPRI may set any priority value
> CMKRNL may change mode to kernel
> IMPERSONATE may impersonate another user
> GRPNAM may insert in group logical name table
> NETMBX may create network device
> OPER may perform operator functions
> SETPRV may set any privilege bit
> SYSNAM may insert in system logical name table
> SYSPRV may access objects via system protection
> TMPMBX may create temporary mailbox
> VOLPRO may override volume protection
> WORLD may affect other processes in the world
>
> And yes, you can use it in that state.
>
>
>
I don't think the default privs ever go away. Could be wrong. Too lazy to check.
More information about the Info-vax
mailing list